Transcription

1 Front cover Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect Redguides for Business Leaders Ken Hogan See how to cut the cost and complexity of protecting large data volumes Learn about the advanced data reduction capabilities of IBM Tivoli Storage Manager Understand how to deliver a world-class backup catalog

2

3 Executive overview Businesses and public sector organizations of all sizes are increasingly dependent on their IT systems to manage almost every aspect of their operations. As the demand for online services and the automation of business processes continues, the amount of data that these organizations need to manage is increasing dramatically every year. This growth in data volume tends to increase the management time and cost of maintaining backup and archive operations. At the same time, many organizations are under pressure to deliver always on access to data and meet more aggressive service level agreements (SLAs). Meeting these requirements while operating within a limited IT budget or while actively seeking to reduce IT costs often proves to be a significant challenge. As a consequence, the concept of out-tasking backup and archive operations can be an attractive option, especially now that cloud backup offerings are becoming more widely available and mature. These cloud solutions typically run over a standard Internet connection. For smaller organizations with low data volumes, they often represent a cost-effective solution that will deliver a reliable data protection service and improved SLAs. However, many of these cloud solutions are built on platforms that cannot deliver the scalability, performance, and flexibility that are required by larger organizations that have more complex systems landscapes and larger amounts of data to protect. Often, cloud backup offerings are little more than remote vaults that offer a limited catalog of services and little protection against failed or missed backups. The recovery times they offer are unlikely to meet the SLAs demanded by larger organizations because it is not feasible to restore large amounts of data quickly enough through a limited bandwidth Internet connection. By contrast, the Tectrade Helix Protect platform is designed for mid-sized and large organizations that are interested in out-tasking their backup and archive operations, but that do not want to compromise SLAs, security, or flexibility. The Helix Protect solution is a pay-as-you-go, managed private cloud backup, recovery, and disaster recovery platform. The service is billed on a monthly basis, and the pricing includes all the required hardware, software, and management services. Because the solution is based on private cloud technologies, the backup operations are performed by an on-premise device that sits within the client s firewall. Meanwhile, the overall service is managed remotely by a team of experts from Tectrade. A primary copy of the backup data remains on-premise under the customer s control, and a second copy is moved off-site either to the customer s own disaster recovery facility or to a secure Tectrade location. Copyright IBM Corp All rights reserved. 1

4 The service is underpinned by highly robust hardware and mature software from IBM, in addition to expert services from Tectrade. Tectrade manages the whole backup service down to the level of individual groups of servers. In many cases, this approach helps to reduce customer administration time by up to 100 percent while delivering backup success of 98 percent or better for critical servers. This IBM Redguide publication explains the business challenges that the Tectrade Helix Protect solution helps to address. It explores the advantages of the offering and provides deeper insight into the solution itself. This guide also provides examples of how customers can use the solution. Business challenges Organizations of all kinds are increasingly coming to realize that a large proportion of the value of their business is in the data stored in their IT systems. As a simple example, without reliable access to data on current orders, production schedules, inventory levels, and supply chain, a manufacturer cannot hope to deliver its products to customers on time. This data needs to be available and protected. If a major incident occurs and servers fail, it is critical to avoid loss of data and to ensure that a rapid recovery is possible. For this reason and to keep management costs at a minimum, most mid-sized and large organizations have already moved from distributed backup solutions, where each system has its own backup system that is managed separately. They are moving to more centralized and standardized backup solutions. The relentless growth in data that many organizations are experiencing is putting an increasing strain on these centralized backup architectures. This growth in data can be driven by many factors such as the following examples: Corporate expansion The need to manage and analyze the business at ever-increasing levels of detail The ongoing automation of previously manual processes Scalability is often an issue, particularly when the business needs to meet the needs of an always on user community. Organizations are facing some of the following typical problems with backup management: Complex backup environments require more time and effort for administration, which increases costs and distracts IT staff from more valuable activities. Finding staff with the appropriate skills can be difficult and expensive. Over-running backup windows affect the performance and availability of systems, reducing users productivity. Recovery processes are time-consuming and unreliable, often failing to meet the organization s recovery time objective (RTO) and recovery point objective (RPO). Limited reporting capabilities make it difficult to monitor backup and restore performance accurately or to identify and address issues quickly. Maintenance costs for backup software are high, and license management and compliance issues are complex. Processes for managing tape storage systems and for transporting and storing tapes offsite are onerous and expensive. 2 Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect

5 Increasing data governance and security requirements means that existing backup processes and policies no longer align with best practices. In response to these challenges, many organizations have upgraded their backup solutions in an attempt to keep data growth under control. For example, deduplication technologies have been deployed to reduce the amount of duplicate data that needs to be stored, and disk-based snapshots have been used to boost recovery performance. However, although these tactics can help alleviate the immediate issues caused by rising data volumes, they do not necessarily address the longer term strategic challenge. Deduplication can reduce the rate at which backup storage requirements increase. However, if the volume of source data continues to rise, the scalability problems will recur eventually. Disk snapshots are expensive in terms of investment in disk capacity and ongoing energy consumption, making them an impractical option for organizations with large data volumes that need to be protected over a long time. Cloud backup solutions offer a new strategic option that can remove the pain of administration and deliver predictable costs. However, the challenge for larger organizations is to find a cloud solution that can balance aggressive pricing with the confidence that the required SLAs will be met and real savings in administration time will be delivered. In many cloud backup offerings, low pricing can be achieved only by using inflexible, shared infrastructures and by providing limited management services. The Tectrade Helix Protect solution aims to meet these requirements by harnessing a private cloud architecture that eliminates many of the typical disadvantages of a cloud backup solution. Business value of the Helix Protect solution The business value of the Tectrade Helix Protect solution relies on the following capabilities: Specialist management services Flexible backup policies High performance and data security Eliminating capital expenditure with pay-as-you-go pricing Proactive data reduction and service reviews Specialist management services Many cloud backup providers primarily host companies or network providers who are seeking to drive more business for their centralized data center services. Others might be providers of basic backup services for smaller organizations. Tectrade, by contrast, is an expert in backup and recovery, with 15 years of experience in delivering enterprise-class backup and archive solutions for mid-sized and large organizations in the private and public sectors. For the last seven years, Tectrade has offered a range of monitoring and managed services that now include the Helix Protect solution. While many cloud providers are offering little more than a remote storage vault, with no detailed management of individual backups, the Helix Protect solution includes management services that extend down to the level of individual backup jobs. This way, the Tectrade team can restart a failed backup or initiate a fix remotely, with no need for intervention from the customer s in-house IT team. 3

6 Tectrade has follow-the-sun operations based in the United Kingdom (UK) and Australia, which enables proactive, 24x7 monitoring and management of customers backups anywhere in the world. Flexible backup policies Table 1 Example backup catalog Typically, managed cloud backup services require a degree of standardization and automation that limits the customer s flexibility, with little ability to customize individual backups to meet specific business needs. This situation can create a problem for mid-sized and large organizations. Often large organizations operate complex IT infrastructures where different types of data require different backup treatment and policies. If a disaster occurs, organizations must understand the relative priority of the servers that need to be recovered and put a robust process in place for restoring the right systems in the correct order. A fundamental differentiating factor for the Helix Protect solution is the concept of the backup catalog. A backup catalog is a framework that maps the required service levels for each major server group and data type within the organization. Table 1 shows an example of the types of data in a backup catalog. Server group Backup type Target Schedule RPO RTO Backup versions Retention Change rate File operating system Application servers File level incremental File level incremental Disk Daily 24 hours 24 hours 31 1 month 2% Disk Daily 24 hours 24 hours 31 1 month 2% Mail Storage group full or incremental Disk Daily incremental 24 hours 24 hours 7 1 week 3% SQL Database full Disk Daily full 24 hours 24 hours 7 1 week 3% The backup catalog provides the customer with a basis for managing the performance of the service. It enables the alignment of individual backup jobs with the SLAs of various data sets, rather than adopting a one-size-fits-all approach. The backup catalog can be as detailed as the customer requires, and backups can be performed as frequently as required by the business. The backup catalog also gives the customer s IT department a means of monitoring backup requirements across the organization. This approach enables accurate chargeback to each line of business depending on the amount of data that it needs to back up each month. High performance and data security To deliver the SLAs for rapid reliable backup and recovery demanded by mid-sized and large organizations, the Helix Protect solution uses an on-premise appliance, managed remotely by a secure connection. As an additional level of resilience, a second copy of the backup data is moved offsite, either to the customer s disaster recovery facility or to a secure Tectrade facility. Using an on-premise appliance means that the customer retains physical control over its data. The on-premise appliance enables the customer to benefit from much higher performance for backup and recovery than an Internet-connected remote cloud solution can deliver. This approach helps to meet the tight RTO and RPO that always on organizations require. 4 Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect

7 Eliminating capital expenditure with pay-as-you-go pricing The pricing model for the Helix Protect solution is based on a simple monthly rate per gigabyte of data at source. The price includes all the required hardware, software, and management services. Basing the pricing on the amount of source data enables customers IT departments to charge other departments within their organization for the backup and archive services that they use. By providing a precise monthly report on the usage of the service, the solution helps customers to plan data reduction strategies and control future costs. Proactive data reduction and service reviews The Helix Protect solution includes regular service reviews, including reviews by backup and storage architects who advise on data reduction strategies for primary data and the backup and archive copies. About the Helix Protect solution The Tectrade Helix Protect solution is a private cloud managed backup solution. At its core is an on-premise appliance that manages data from within the customer s firewall and uses a secure off-site storage facility for a second copy of the backup data. The on-premise appliance underpins high performance backup and recovery, while offsite storage ensures a robust disaster recovery capability. The on-premise appliance consists of next-generation data protection software, a management server, and the disk and tape systems that are required to store the backup data. The solution includes the following standard components: IBM Tivoli Storage Manager IBM System x server IBM System Storage disk storage systems For certain data types or long-term retention requirements, the platform might also include an IBM tape storage system. Off-site storage consists of various options that are configured to match the customer s SLA, security, and budget requirements. The IBM hardware and software components that make up the Helix Protect solution are used by large organizations to handle backup and recovery for massive amounts of data. Tectrade has incorporated these technologies into a platform that is both affordable for mid-sized organizations and capable of scaling to meet the requirements of the largest businesses. The platform is configured to meet the customer s particular data profile, backup catalog, and SLA needs, and it is sized for up to five years of growth. 5

8 Data protection software IBM Tivoli Storage Manager is an enterprise-class backup and archiving solution that delivers true move less or store less functionality: Deduplication reduces total data storage needs by ensuring that when duplicate blocks of data need to be backed up, only a single copy of each block is stored. Progressive incremental backup uses a sophisticated algorithm that minimizes the size of individual backups by copying only the data that changed since the previous backup. This approach reduces network traffic and helps to keep backup windows as small as possible. As a result, it reduces the risk of over-running backups that affect user productivity. Compression reduces the amount of data that is sent by the Tivoli Storage Manager Client to the central backup server by using compression algorithms at the source. This approach both reduces network traffic and cuts the total backup storage requirements. Tivoli Storage Manager delivers unified backup and recovery across a wide range of devices and applications in physical and virtual environments. The base pricing for the Helix Protect solution includes access to advanced Tivoli Storage Manager capabilities and future enhancements. Hardware infrastructure The on-premise Helix Protect appliance is configured according to the volume of source data that needs to be backed up, the profiles of the various data sets, and the requirements defined in the backup catalog. The appliance is delivered in a single rack configured with the required components: A management server Internal or external disk A tape library (when appropriate) Offsite storage can be configured by using various options including the following examples: A replicated appliance in the customer s disaster recovery facility or in the Tectrade secure offsite data center Copy data moved to tape and moved to a secure tape repository The Helix Protect solution charges include all tape movement and storage costs. Although many cloud providers are using only disk-based methods for backup and archiving, for the larger enterprise, tape still represents a less expensive, more reliable method for long-term data retention. By using Tivoli Storage Manager tape management functions, recovery performance for large data volumes is comparable to or better than disk. Management services The management services included in the Helix Protect solution are delivered remotely by a secure link from the Tectrade UK data center. Support teams based in the UK, Holland, and Australia, provide 24x7 coverage all year long. The teams consist of level-one, level-two, and level-three support personnel. The teams reflect the 15 years of experience that Tectrade has in designing, deploying, and supporting large IBM Tivoli Storage Manager environments. 6 Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect

9 Case studies This section highlights three fictitious customer examples. A city council The city council to a large urban population is responsible for providing public services. It has several thousand users who use thin client personal computers (PCs) to access central applications on a wide range of platforms. Much of the data is highly sensitive, making the security of its backups a key concern. Following a successful four-week trial, Tectrade was selected to provide a full backup management service. By using the Helix Protect solution, the council can minimize the complexity of its old per-server licensing model for backup software. It now pays for all backup services on a fixed price basis per gigabyte. This solution has saved a considerable amount of time for the council s busy IT staff because they no longer need to manage compliance. With the 24x7 management services that the Helix Protect solution includes as standard, the council no longer needs to ask its IT team to be on-call during evenings and weekends. Most important of all, by using the Helix Protect solution, the council can plan its backup costs with absolute certainty. Compared to its previous backup environment, the solution will deliver significant savings over the three contracted years. A large online retail organization A large online retail organization had an existing backup solution that was experiencing significant performance issues. Backups ran slowly, and some client/servers were frequently over-running the backup window. Backup success rates were also poor. The mix of data types in this organization led Tectrade to recommend a Helix Protect appliance that consists of a mix of disk and tape systems. By using this approach, the solution can maximize deduplication while reducing overall costs. After a lengthy evaluation and proof-of-concept process, the company realized that the Tectrade approach delivers considerable value for its business. As a result, the Helix Protect solution was selected as a replacement for the existing solution. Tectrade now assumes full responsibility for management of the entire backup environment, and the company has seen a significant improvement in both backup performance and success rates. A large university This large university needed to find a way to manage, store, and back up several hundred terabytes of data. The cost of adding storage devices and tape drives was unsustainable. The existing approach did not address the basic issue of data duplication and unmanaged growth. The Helix Protect solution provided a comprehensive data management strategy. It used incremental backups, deduplicated data, and advanced reporting software to back up several hundred servers with data generated by tens of thousands of users. The university focuses on serving student and faculty needs, and the Tectrade solution provides a complete data management service. Data deduplication minimizes the physical disk requirements for backup storage, avoiding the need to buy more storage devices. Virtualized tape libraries have replaced physical tape libraries, eliminating the expense of moving and managing tapes. 7

10 Conclusion Many organizations data volumes are currently growing by 30 percent or more per year. The management time and infrastructure required to run increasingly complex backup operations is placing pressure on flat IT budgets. For the smaller organization, a wide range of online backup solutions can help relieve the management pressure and deliver an acceptable service at an affordable price. However, for the larger, more sophisticated organization, a one-size-fits-all solution might not deliver the flexibility, scalability, security, and service levels that are required. The Helix Protect solution was developed specifically for mid-sized and large organizations that are looking to reduce operational costs while maintaining or improving service levels. The solution provides true enterprise-class performance, underpinned by management services that are delivered by backup experts and based on highly reliable IBM hardware and software. Tectrade currently manages over 6,585 backup clients for 125 customers worldwide, protecting 3.8 petabytes of data and delivering an average backup success rate of 99 percent for tier one servers. If your organization is struggling to deal with growing data volumes and complexity, the Helix Protect solution is a compelling option. Other resources for more information For more information, see the following resources: Tectrade Helix Protect platform -protect-platform.html IBM solutions for data protection IBM Tivoli Storage Manager The team who wrote this guide This guide was produced by a specialist working with the International Technical Support Organization (ITSO). Ken Hogan is Chairman of Tectrade. Ken started his career as a chartered accountant. He co-founded Tectrade in 1991 with Shelagh Elkins. Ken has over 20 years experience in the technology industry and a solid understanding of the commercial and technological needs of a business. He has guided and directed the delivery of the Tectrade Helix Protect solution. His ongoing focus is centered on developing the strategy and the next generation of leaders for the Tectrade Group. Thanks to LindaMay Patterson, IBM ITSO, Rochester, MN, for her contributions to this project. 8 Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect

11 Now you can become a published author, too! Here s an opportunity to spotlight your skills, grow your career, and become a published author all at the same time! Join an ITSO residency project and help write a book in your area of expertise, while honing your experience using leading-edge technologies. Your efforts will help to increase product acceptance and customer satisfaction, as you expand your network of technical contacts and relationships. Residencies run from two to six weeks in length, and you can participate either in person or as a remote resident working from your home base. Find out more about the residency program, browse the residency index, and apply online at: ibm.com/redbooks/residencies.html Stay connected to IBM Redbooks Find us on Facebook: Follow us on Twitter: Look for us on LinkedIn: Explore new IBM Redbooks publications, residencies, and workshops with the IBM Redbooks weekly newsletter: https://www.redbooks.ibm.com/redbooks.nsf/subscribe?openform Stay current on recent IBM Redbooks publications with RSS Feeds: 9

13 Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. Copyright IBM Corp All rights reserved. 11

14 This document, REDP , was created or updated on February 19, Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. These and other IBM trademarked terms are marked on their first occurrence in this information with the appropriate symbol ( or ), indicating US registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at Redbooks The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: IBM Redbooks Redguide Redbooks (logo) System Storage System x Tivoli The following terms are trademarks of other companies: Other company, product, or service names may be trademarks or service marks of others. 12 Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide Cloud computing has become a business evolution that is impacting all facets of business today, including sales,

IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices

IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all

Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies

Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what

Tivoli Endpoint Manager for Security and Compliance Analytics User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM

Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database

IBM Security QRadar Version 7.2.2 Packet Capture Users Guide SC27-6512-00 Note Before using this information and the product that it supports, read the information in Notices on page 9. Copyright IBM Corporation

IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.

IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition

IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 7. Copyright IBM Corp.

Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,

Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,

IBM Flex System FC5022 2-port 16Gb FC Adapter IBM Redbooks Product Guide The network architecture on the IBM Flex System platform has been specifically designed to address network challenges, giving you

BDR TM V3.0 DEPLOYMENT AND FEATURES VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results of

IBM Global Technology Services White Paper IBM Business Continuity and Resiliency Services Using the cloud to improve business resilience Choose the right managed services provider to limit reputational

Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies

IBM TRIRIGA Version 10 Release 5 Real Estate Transaction Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition

Backup and recovery: risk vs. cost conundrum Abstract Data protection has never been more important, or more challenging. With extreme data growth, accelerating mobility, increasing use of virtualization

IBM Software Thought Leadership White Paper January 2013 The business value of improved backup and recovery The IBM Butterfly Analysis Engine uses empirical data to support better business results 2 The

IBM Tivoli Identity Manager Version 5.0.1 First Edition (December 7, 2007) This edition applies to version 5.0 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise

IBM TRIRIGA Version 10 Release 4.2 Inventory Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies to

Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end

IBM TRIRIGA Version 10 Release 4.2 Procurement Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 29. This edition applies

BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers

Dell Data Protection Point of View: Recover Everything. Every time. On time. Dell Data Protection White Paper May 2013 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies

IBM Security QRadar Version 7.2.0 Common Ports Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 11. Copyright IBM Corp.

Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that